<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=5292226&amp;fmt=gif">
Skip to content

Frequently
Asked
Questions

Do you need help? We're here for you.

Our Platform

What is Engineering Intelligence (EI)?

SPREAD’s Engineering Intelligence is an AI-driven, federated system designed for engineering teams. It consists of three core layers:

  1. Rapid Data Ingestion – Smart connectors integrate structured and unstructured data from CAD, PLM, ERP, IoT, and other sources into the Engineering Intelligence Graph.

  2. Product Twin (PT) – A federated Knowledge Graph that contextualizes data across the product lifecycle, providing engineers with a unified, queryable data model.

  3. Action Cloud – AI-driven automation and analytics enable engineers to conduct compliance checks, optimize requirements, and analyze dependencies efficiently.

This architecture transforms raw engineering data into context-aware, AI-actionable knowledge, reducing manual effort and improving decision-making.

What is an Engineering Intelligence Graph (EI Graph)?

SPREAD’s Engineering Intelligence Graph (EI Graph) is a federated supergraph that unifies structured and unstructured product data across domains (R&D, Production, Aftermarket).
It leverages:

  • GraphQL-based schema to standardize data models.

  • Subgraphs optimized per domain, aggregated into a unified, scalable supergraph.

  • Automated AI-assisted data mapping to integrate diverse engineering data sources.

This enables cross-domain insights, real-time querying, and advanced analytics, making complex product data machine-readable and actionable. If you like to learn more about it, please watch this video: https://www.spread.ai/resources/knowledge-hub/how-we-use-a-graphql-schema-as-a-contract-to-efficiently-build-applications

Can SPREAD be integrated with existing systems?

Yes. SPREAD provides out-of-the-box connectors, API integrations, and graph federation to ingest data from CAD, PLM, ERP, and IoT systems. Features include:

  • Declarative data mapping – Standardizing heterogeneous data formats.

  • Real-time synchronization – Ensuring up-to-date insights.

  • Federated query capabilities – Allowing seamless interaction with external data sources.

SPREAD enhances existing tool chains by unifying, structuring, and contextualizing data, eliminating silos.

What types of data can be connected and analyzed with SPREAD?

SPREAD integrates and analyzes diverse product data across the entire lifecycle. This includes CAD design data, engineering specifications, production metrics, test results, maintenance logs, and real-world usage feedback.

By unifying structured and unstructured data from multiple sources, SPREAD creates a comprehensive, interconnected view that enables engineers to understand complex dependencies, make data-driven decisions, and optimize product development and support processes.

How does SPREAD differ from or relate to PLM software?

SPREAD extends beyond traditional PLM by creating a federated Engineering Intelligence Graph that integrates:

  • Design (CAD), Engineering (PLM), Production (ERP), Testing, Aftermarket, and IoT data.

  • Real-time system-wide dependency analysis.

  • AI-driven automation for compliance, issue resolution, and requirement validation.

Unlike traditional PLM, SPREAD harmonizes disparate data into a single Product Twin, enabling engineers to analyze relationships, automate workflows, and make data-driven decisions efficiently.

What are Engineering Intelligence Agents (EI Agents)?

EI Agents are AI-driven routines operating within SPREAD’s Engineering Intelligence Graph. They can be taught to automate engineering tasks by interpreting queries, accessing structured and unstructured data, and providing validated, context-aware insights.

These agents streamline workflows, enhance data mapping, and support high-value tasks like requirements analysis, error pattern detection, and specification generation.

Security

How is the security of SPREAD products tested?

Our enterprise-grade security certifications, including ISO 27001, TISAX and SOC 2 that is ongoing, validate our compliance to the highest security standards.

SPREAD features undergoes daily vulnerability scans performed by automated security tools to uncover potential flaws or misconfigurations. All findings are assessed

and remediated according to our internal vulnerability management procedure. In addition to that, we have hired an external company specialized in Penetration
Testing to conduct an assessment of our platform. Testing is performed annually or on a significant change in our architecture.

Does SPREAD have any rights to my data?

All data that you upload to or develop on the SPREAD platform remains owned by you and is treated as your confidential information.

How is SPREAD protected against cyber attacks?

SPREAD features undergoes daily vulnerability scans performed by automated security tools to uncover potential flaws or misconfigurations. All findings are assessed and remediated according to our internal vulnerability management procedure. In addition to that, we have hired an external company specialized in Penetration Testing to conduct an assessment of our platform. Testing is performed annually or on a significant change in our architecture. Our enterprise-grade security certifications, including ISO 27001, TISAX and SOC 2 that is ongoing, validate our compliance to the highest security standards.

Which SPREAD deployment option is right for my business?

Most SPREAD customers are benefiting from the cost-effectiveness provided by SPREAD's SaaS deployment option ("SPREAD Cloud"). However, organizations with
more stringent data governance policies or those required to comply with external standards and regulations might need the additional data isolation provided by
Managed Deployments ("Client Cloud" or custom solution). Contact our Sales to help you with understanding the value of each deployment model.

Can we use multi-factor authentication for sign-in to SPREAD?

Multi-factor authentication (MFA) can be used when SSO is enabled, but is dependent on the features supported by your Identity Provider. MFA configurations are managed by your IdP Administrators.